• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cybersecurity

CRN Features Pondurance in 2022 Partner Program Guide

March 28, 2022 TechDecisions Staff Leave a Comment

Company recognized for its Channel Partner Program INDIANAPOLIS–(BUSINESS WIRE)–Pondurance, a leader in Managed Detection and Response (MDR) services, has been featured by CRN®, a brand of The Channel Company, in its 2022 Partner Program Guide. CRN’s annual Partner Program Guide is the ultimate list of the most notable partner programs from industry-leading technology vendors that […]

Read More

Trellix and CSIS Find Organizations Outmatched by Nation-State Cyber Threat Actors

March 28, 2022 TechDecisions Staff Leave a Comment

Report Highlights Increased Government Support Required to Defend Against Sophisticated Nation-States NEWS HIGHLIGHTS 86 percent of respondents believe they have been targeted by a cyberattack conducted by a group acting on behalf of a nation-state Only 27 percent of respondents said they have complete confidence in the ability of their organization to differentiate between nation-state […]

Read More

How Fast Does Ransomware Encrypt Files?

Research from Splunk suggests some ransomware groups have an encryption speed of mere minutes, with LockBit being the fastest.

March 25, 2022 Zachary Comeau Leave a Comment

For IT and cybersecurity professionals, ransomware has been the scourge of the earth over the last two years, as the cybercrime economy continues to grow and beat system administrators and network defense pros to the point of attack. One reason for the difficulty in preventing and responding to ransomware attacks is the speed with which […]

Read More

Semperis Extends Breach Preparedness and Incident Response Services for Identity-Based Cyberattacks to Broader Customer Set

March 24, 2022 TechDecisions Staff Leave a Comment

Former bp Chief Information Security Officer Simon Hodgkinson Joins the Company’s Strategic Advisory Board to Support the Service Offerings HOBOKEN, N.J.–(BUSINESS WIRE)–#ActiveDirectory—Semperis, the pioneer in identity-driven cyber resilience for enterprises, today announced the broader availability of its Breach Preparedness and Response (BP&R) services to further support the surging customer demand for comprehensive protection from identity-based […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

30% Of Log4j Instances Remain Vulnerable To Exploitation

Qualys finds that nearly a third of Log4j instances remain vulnerable to attack more than three months after the flaw was discovered.

March 24, 2022 Zachary Comeau Leave a Comment

More than two months after the Log4j vulnerabilities known as Log4Shell were discovered, 30% of Log4j instances remain vulnerable for hackers to exploit and take control of affected systems, according to cybersecurity firm Qualys. The company indexed more than 10 trillion data points across its installed enterprise customer base and completed six billion IP scans […]

Read More

SIMBA Chain to Build Blockchain Backed Local Health Supply Chain System, Fueling MxD Medical Marketplace

March 24, 2022 TechDecisions Staff Leave a Comment

SIMBA Chain will support MxD’s Rx Product Marketplace Orchestrator, Afforded by U.S. Department of Commerce SOUTH BEND, Ind.–(BUSINESS WIRE)–#blockchain—SIMBA Chain, Inc., a chain-agnostic API development platform providing pathways to Web3 for cloud-based Web2 companies, has announced its intent to build a Local Health Alert System to conduct contact tracing and data analysis on-chain, translating real-time […]

Read More

JFrog Partners with Softline India to Accelerate DevOps and DevSecOps Adoption

March 24, 2022 TechDecisions Staff Leave a Comment

Partnership Enables Softline Consultants to Provide the JFrog Platform for Supporting Customers’ Digital Transformation and Software Supply Chain Security Initiatives SUNNYVALE, Calif. & BANGALORE, India–(BUSINESS WIRE)–JFrog Ltd. (“JFrog”) (NASDAQ: FROG), the Liquid Software company and creators of the JFrog DevOps Platform, today announced a new partnership with Softline India, Ltd., a global provider of IT […]

Read More

CompTIA ConnectWise Apprenticeship

This Brief IT Department Survey Will Help Us Create Valuable Content

We want to learn more about the IT industry's struggles and successes. By filling out this quick survey, you can help us do that.

March 23, 2022 TD Staff Leave a Comment

The IT industry has innovated to meet the challenges of the last two years in incredible fashion, resulting in more efficient, productive and safer business for the overall organization. While IT professionals rose to meet that challenge, it wasn’t without it’s share of obstacles and challenges. From remote work to an accelerated cloud migration to […]

Read More

DTEX Systems Extends Microsoft 365 E5 Defender NGAV, Information Protection & Compliance Capabilities with DTEX InTERCEPT for Behavioral DLP

March 23, 2022 TechDecisions Staff Leave a Comment

First and Only Integrated Insider Risk, UEBA, DLP and Forensics Platform Delivers Unmatched Human Telemetry, Visibility & Security Intelligence; Helps Microsoft Security Customers Maximize Value of Microsoft E5 Information Protection Investments SAN JOSE, Calif.–(BUSINESS WIRE)–#cybersecurity—DTEX Systems, the Workforce Cyber Intelligence & Security CompanyTM, today announced new capabilities within its DTEX InTERCEPT for Behavioral DLP solution […]

Read More

Lapsus$ Microsoft Okta

Lapsus$ Attacks: Microsoft Says Group Pays Employees For Initial Access; Okta Provides Attack Timeline

Microsoft and Okta provide more details on the Lapsus$ hacking group, including how it gains initial access and impacts to both companies.

March 23, 2022 Zachary Comeau Leave a Comment

Microsoft acknowledges Lapsus$ accessed source code, downplays risk to customers and risk of elevation Lapsus$ uses extensive social engineering, including paying victims’ employees for initial access and convincing help desks to reset credentials Group uses VPNs, RDP, VDI and identity providers such as Azure AD, Okta in attacks Okta says 2.5% of customers potentially impacted […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 72
  • Page 73
  • Page 74
  • Page 75
  • Page 76
  • Interim pages omitted …
  • Page 163
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.